On Mon, Mar 18, 2013 at 2:58 PM, Mark Hutchings <span dir="ltr"><<a href="mailto:mark.hutchings@gmail.com" target="_blank">mark.hutchings@gmail.com</a>></span> wrote:<br><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div text="#000000" bgcolor="#FFFFFF">
<div>You sure it was just a http attack?
Several hundred requests in a few minutes shouldnt really put it
on it's knees, unless the server is a VPS with low memory/CPU
usage limits, or the server itself is low on resources. <br></div></div></blockquote><div><br></div><div>I've gone over my access logs again, and here are the particulars on the two attacks that caused the server to hang:</div>
<div><br></div><div>On March 6th, between 4:29:11 and 4:31:40, there were 1453 requests from a single IP, and all were 'GET' requests for a single page (one that <i>does</i> exist).</div><div><br></div><div>On March 14th, between 15:15:19 and 15:16:29, there were 575 requests from the one IP address. These were all different GET requests, nearly all resulting in 404 errors. Some appear to be WordPress URLs. (The website on my server is a Magento commerce site.)</div>
<div><br></div><div>Here are some other example requests from the attack:</div><div><ul><li>GET /?_SERVER[DOCUMENT_ROOT]=<a href="http://google.com/humans.txt">http://google.com/humans.txt</a>? HTTP/1.1</li><li></li><li>GET /?npage=1&content_dir=<a href="http://google.com/humans.txt%00&cmd=ls">http://google.com/humans.txt%00&cmd=ls</a> HTTP/1.1</li>
<li>GET /A-Blog/navigation/links.php?navigation_start=<a href="http://google.com/humans.txt">http://google.com/humans.txt</a>? HTTP/1.1</li><li>GET /Administration/Includes/deleteUser.php?path_prefix=<a href="http://google.com/humans.txt">http://google.com/humans.txt</a> HTTP/1.1</li>
<li></li><li>GET /BetaBlockModules//Module/Module.php?path_prefix=<a href="http://google.com/humans.txt">http://google.com/humans.txt</a> HTTP/1.1</li><li>GET /admin/header.php?loc=<a href="http://google.com/humans.txt">http://google.com/humans.txt</a> HTTP/1.1</li>
</ul></div><div>I don't recognize most of these, but the pattern indicates to me that these are most likely 'standard' URLs in various CMSs.</div><div><br></div><div>As for the server configuration, it is a dedicated server (only one website) running on VMware ESXi 5.0.</div>
<div><ul><li>CentOS 6.3</li><li>8 virtual CPU cores (2 quad-core CPUs)</li><li>4096 MB memory</li></ul></div><div>Other VMs on the same host appeared to be unaffected by the attack.</div><div><br></div><div>Thanks,<br>~ j.<br>
<a href="mailto:jwade@userfriendlytech.net" target="_blank">jwade@userfriendlytech.net</a></div><br><br><div> </div></div>